Search Results - ((detection algorithm) OR (((section algorithm) OR (optimization algorithm))))

Refine Results
  1. 1

    Solving time gap problems through the optimization of detecting stepping stone algorithm by Omar, Mohd. Nizam, Maarof, Mohd. Aizaini, Zainal, Anazida

    Published 2004
    “…It is found that current algorithm of detecting stepping stone is not optimized. …”
    Get full text
    Get full text
    Book Section
  2. 2

    Early diabetes risk prediction using Ant Colony Optimization algorithm / Nur Aisyatul Husna Ahmad Yusri and Rizauddin Saian by Ahmad Yusri, Nur Aisyatul Husna, Saian, Rizauddin

    Published 2023
    “…Therefore, this study has developed a classification model for predicting early diabetes risk using an Ant Colony Optimization (ACO) algorithm. The ACO-based classification algorithm, Ant-Miner is used to train the diabetes dataset of 520 new diabetes or potential diabetes patients from Sylhet Diabetes Hospital in Sylhet, Bangladesh. …”
    Get full text
    Get full text
    Book Section
  3. 3

    Adaptive DNA computing algorithm by using PCR and restriction enzyme by Watanabe, Shinpei, Tsuboi, Yusei, Ibrahim, Zuwairie, Yamamoto, Tsuneto, Ono, Osamu

    Published 2004
    “…By doing this, the molecules which serve as a solution candidate can he narrowcd down and the optimal solution can be detected easily. From the application point of view, a simulation has been carried out on the shortest puth problem and the validity of the proposed adaptive algorithm is stated from the results of the simulation. …”
    Get full text
    Get full text
    Book Section
  4. 4
  5. 5
  6. 6

    Fault Detection Relevant, Neural Network and Evolutionary Algorithm based Model for a Single-shaft Industrial Gas Turbine by Alemu Lemma, Tamiru, Rangkuti, Chalillullah, Mohd Hashim, Fakhruldin

    Published 2009
    “…In this paper the result of an attempt to develop a substitute nonlinear model based on multilayer neural network (MLNN) and evolutionary algorithm (EA) for a single-shaft gas turbine having IGVs and VSVs is presented. …”
    Get full text
    Conference or Workshop Item
  7. 7
  8. 8

    Salivary based sers analysis in recognition of ns1 for pcasvm classification of dengue fever / Afaf Rozan Mohd Radzol by Mohd Radzol, Afaf Rozan

    Published 2018
    “…The spectra are pre-processed to remove unwanted features using signal processing algorithms customized and optimized for this study. …”
    Get full text
    Get full text
    Book Section
  9. 9

    A new hybrid technique for nosologic segmentation of primary brain tumors / Shafaf Ibrahim by Ibrahim, Shafaf

    Published 2015
    “…For this purpose, an algorithm which hybridized the Intensity Based Analysis (IBA), Grey Level Cooccurrence Matrices (GLCM), Adaptive Network-based Fuzzy Inference System (ANFIS) and Particle Swarm Optimization (PSO) Clustering Algorithm (CAPSOCA) is proposed. …”
    Get full text
    Get full text
    Book Section
  10. 10
  11. 11

    New synchronization protocol for distributed system with TCP extension by Bayat, Peyman

    Published 2013
    “…These results show that the proposed algorithm, on average, has 7.97% higher fault-tolerance. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Face recognition using PZMI, ANN and Ant colony algorithms / Milad Miri by Milad , Miri

    Published 2018
    “…Usually, most of the standard face recognition systems contain four sections: face detection, feature extraction, feature selection, and classification. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Intrusion Detection Systems, Issues, Challenges, and Needs by Aljanabi, Mohammad, Mohd Arfian, Ismail, Ali, Ahmed Hussein

    Published 2021
    “…However, these algorithms suffer from many lacks especially when apply to detect new type of attacks, and need for new algorithms such as JAYA algorithm, teaching learning-based optimization algorithm (TLBO) algorithm is arise. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Improved intrusion detection algorithm based on TLBO and GA algorithms by Aljanabi, Mohammad, Mohd Arfian, Ismail

    Published 2021
    “…Optimization algorithms are widely used for the identification of intrusion. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems by Mohammad Khamees Khaleel, Alsajri

    Published 2022
    “…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
    Get full text
    Get full text
    Thesis
  16. 16

    An improved method using fuzzy system based on hybrid boahs for phishing attack detection by Noor Syahirah, Nordin

    Published 2022
    “…The algorithms involved were Genetic Algorithm, Differential Evolution Algorithm, Particle Swarm Optimization, Butterfly Optimization Algorithm, Teaching-Learning-Based Optimization Algorithm, Harmony Search Algorithm and Gravitational Search Algorithm. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Cooperative source detection using an optimized distributed levy flight algorithm by Ab.Majid, Mad Helmi, Arshad, Mohd Rizal, Yahya, Mohd Faid

    Published 2023
    “…The DLF algorithm is optimized by means of repulsive artificial potential force to disperse the agents in order to optimize the search space coverage and detection time. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Robust multi-user detection based on hybrid grey wolf optimization by Ji, Yuanfa, Fan, Z ., Sun, X., Wang, S., Yan, S., Wu, S., Fu, Q., Kamarul Hawari, Ghazali

    Published 2020
    “…In this paper, a novel hybrid Grey wolf optimization and differential evolution algorithm robust multi-user detection algorithm is proposed to overcome the problem of high bit error rate (BER) in multi-user detection under impulse noise environment. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Book Chapter
  19. 19

    Rao-SVM machine learning algorithm for intrusion detection system by Abd, Shamis N., Alsajri, Mohammad, Ibraheem, Hind Raad

    Published 2020
    “…Most of the intrusion detection systems are developed based on optimization algorithms as a result of the increase in audit data features; optimization algorithms are also considered for IDS due to the decline in the performance of the human-based methods in terms of their training time and classification accuracy. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Pengoptimuman algoritma pengesanan batu loncatan dalam sistem pengesanan pencerobohan by Omar, Mohd. Nizam

    Published 2005
    “…The results from both the optimized approach and existing algorithm are compared. …”
    Get full text
    Get full text
    Thesis